Scalable Protocol Design. Supporting Millions of Simultaneously-connected Devices
|
|
- Cornelius Green
- 5 years ago
- Views:
Transcription
1 Scalable Protocol Design Supporting Millions of Simultaneously-connected Devices
2 OpenDOF Project Background 2 Open-source project, royalty-free Founded by Panasonic in 2015 A complete IoT framework over 10 years in the making Implementations in Java, C#, and C/C++ Full, open protocol specifications
3 IoT Platform Requirements 3 More information about these five principles can be found at http: //opendof.org. Secure Interoperable Flexible Scalable Reliable
4 What is an IoT Protocol? 4 Defined by actors involved usually small machines Used to mean small binary protocols Required by transports and machine capabilities The web introduced new actors people Protocols moved toward human-readable Are web protocols appropriate for machines?
5 People or Machines? 5 When people are the audience, people will pay Indirect payment attached to advertising Monthly fees for services that they directly use Machines are a more difficult problem Machines do not have eyes, so no advertising It is more difficult to get people to pay for services that they use indirectly through their machines
6 Areas of Focus 6 Device Communications Security Object Model State Implementation How low can you go? What do you require? Small, fast, yet secure? Defined, yet flexible? How much? How inexpensive?
7 Designing for Lost-Cost Scale Devices 7 Low-cost devices place restrictions on protocols Transports are often low-power, limited, or costly Entropy is limited, as is the ability for (fast) math Small devices like binary protocols with easy parsing Always consider the edge cases 100Kb of whitespace Fields in the exact wrong order
8 Designing for Low-Cost Scale Communications 8 Transports flexibility is key You may not always have TCP/IP (or guaranteed in-order) You may not be one hop from the cloud Bandwidth consider effects of wireless Favorable pricing when total consumption under low limits Every additional round-trip can be costly (time and money)
9 Designing for Low-Cost Scale Security 9 Simplify your security model Balance permission granularity with overhead Consolidate and pre-authorize when possible Combine authentication and authorization OpenDOF security model allows this Techniques can be applied to other protocols Lightbulbs will not have Facebook accounts
10 Designing for Low-Cost Scale Object Model 10 Simplify your object model Uniform identifiers Don t make changes after release keep functionality lookup simple Unify your object model and security model Reduce ambiguity, increase security Consider lookup keys Each stateful variable should have an associated unique key
11 Designing for Low-Cost Scale State 11 State is expensive at scale Persistent storage or persistent connections Stateless is expensive at scale Repetition in requests, each request stand-alone Some features are worth the state
12 Stateful Examples from OpenDOF 12 Discovery Rather than centralize registration, search when needed Requests may flood through the network and maintain state When a new object exists, it can immediately propagate Failover Allow operations to fail-over from one connection to another Requires global identification and security constructs
13 Implementing For Low-Cost Scale 13 Linear Scale Every component must scale linearly This requires testing at scale Separation of Concerns Handle as much as possible at the endpoint, forward the rest to a queue for workers
14 Scalable Design Pattern Example 14
15 Demonstration 15 Different implementations: C, Java, C# Complex topology: Client <-> Cloud <-> GW <-> Device Security bridging Packet capture in Wireshark
16 How You Can Participate User 16 Visit the site Download an SDK Go through the tutorials Participate on the forums No license required, full patent pledge
17 How You Can Participate Contributor 17 Visit Get an account Submit a contribution agreement Pick a project and help out
18 Thank You Questions Welcome
UNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet SDN: Control Plane ACK: content taken from Foundations of Modern
More informationAdvanced Network Design
Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationMAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation
More informationConfigure Intercluster Lookup Service
Intercluster Lookup Service Overview, page 1 ILS Prerequisites, page 2 ILS Configuration Task Flow, page 2 ILS Interactions and Restrictions, page 9 Intercluster Lookup Service Overview The Intercluster
More informationIQRF. Basic informations. Piotr Antończyk IQRF Tech s.r.o.
IQRF Basic informations Piotr Antończyk IQRF Tech s.r.o. History Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF technology Ecosystem provider Basic features IQRF is complete wireless
More informationCitrix NetScaler Administration Training
Citrix NetScaler Administration Training Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1 NetScaler Overview
More informationCourse Objectives In this course, students can expect to learn how to:
CNS-222 Citrix NetScaler Essentials and Unified Gateway The objective of this course is to provide the foundational concepts and teach the skills necessary to deploy, secure and manage a Citrix NetScaler
More informationF5 DDoS Hybrid Defender : Setup. Version
F5 DDoS Hybrid Defender : Setup Version 13.1.0.3 Table of Contents Table of Contents Introducing DDoS Hybrid Defender... 5 Introduction to DDoS Hybrid Defender...5 DDoS deployments... 5 Example DDoS Hybrid
More informationPage 2 Skype Connect Requirements Guide
Thinking about implementing Skype Connect? Read this guide first. Skype Connect provides connectivity between your business and the Skype community. By adding Skype Connect to your existing SIP-enabled
More informationJXTA TM Technology for XML Messaging
JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org
More informationCustom Forms and Products
Custom Forms and Products What is a Custom Form? A Custom Form is a form that is created to collect added information. It is often necessary to collect added information. A custom form can be used on it
More informationVXLAN Overview: Cisco Nexus 9000 Series Switches
White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide
More informationDevelop Mobile Front Ends Using Mobile Application Framework A - 2
Develop Mobile Front Ends Using Mobile Application Framework A - 2 Develop Mobile Front Ends Using Mobile Application Framework A - 3 Develop Mobile Front Ends Using Mobile Application Framework A - 4
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Thammasat University Final Exam: Semester, 205 Course Title: Introduction to Data Communications Instructor: Steven Gordon
More informationIQRF - Mesh Networking
IQRF - Mesh Networking Overcoming Challanges with RF Mesh Networks Sebastian Hopp IQRF Tech s.r.o. 2nd November 2017 Microrisc Ltd. Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF
More informationSOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits
SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship
More informationArchitectural Principles
Architectural Principles Brighten Godfrey CS 538 January 29 2018 slides 2010-2017 by Brighten Godfrey unless otherwise noted Cerf and Kahn: TCP/IP Clark: TCP / IP design philosophy Goals of the architecture
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationBluetooth low energy technology Bluegiga Technologies
Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background
More informationLecture 04 Introduction: IoT Networking - Part I
Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking
More informationIQRF Alliance. Simon Chudoba CEO, IQRF Alliance. Šimon Chudoba, IQRF Alliance, CEO
IQRF Alliance Simon Chudoba CEO, IQRF Alliance Šimon Chudoba, IQRF Alliance, CEO Members 65 members 15 countries 200k+ devices installed Wireless Solutions Smart Cities Smart Buildings Internet of Things
More informationDESIGN AND PERFORMANCE OF DATA COMMUNICATION PROTOCOL BETWEEN TRAFFIC MANAGEMENT CENTER AND ON BOARD UNIT CLOUD SERVER FOR SUPPORTING INTELLIGENT TRANSPORT SYSTEM SERVICES Achmad Affandi 1, Eko Setijadi
More informationITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
More informationRouting. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP
outing Info 341 Networking and Distributed Applications Context Layer 3 Addresses, fragmentation, reassembly Layer 4 end-to-end communication UDP, TCP outing At layer 3 Often relies on layer 4 Application
More informationWhitepaper. 4 Ways to Improve ASP.NET Performance. Under Peak Loads. Iqbal Khan. Copyright 2015 by Alachisoft
Whitepaper 4 Ways to Improve ASP.NET Performance Under Peak Loads By Iqbal Khan April 18, 2015 Copyright 2015 by Alachisoft Table of Content Introduction... 1 The Problem: Scalability Bottlenecks... 1
More informationCredit based Flow Control PAR, 5 Criteria & Objectives
Credit based Flow Control PAR, 5 Criteria & Objectives Results of 2/20/14 DCB TG CC discussion new dcb lynch cb flow control par 5c obj 0214 v02 1 PROJECT AUTHORIZATION REQUEST Based on IEEE 802 LMSC Operations
More informationOptimize and Accelerate Your Mission- Critical Applications across the WAN
BIG IP WAN Optimization Module DATASHEET What s Inside: 1 Key Benefits 2 BIG-IP WAN Optimization Infrastructure 3 Data Optimization Across the WAN 4 TCP Optimization 4 Application Protocol Optimization
More informationAdapter for Mainframe
BEA WebLogic Java Adapter for Mainframe Introduction Release 5.1 Document Date: August 2002 Copyright Copyright 2002 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software and documentation
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationOpengear Technical Note
) 0 FO U N D Y FastIron Workgroup X N E T WO R K S C o n s o le L in k 0 P o w e r F F F F 0 0 0 0 0 0 S Y T R P S S T A T D U P L X S P E E D M O D E 0 0 -Port Standard KVM Switch Model B00-00 0 0 C at
More informationLecture 15 Networking Fundamentals. Today s Plan
Lecture 15 Networking Fundamentals Slides attributed to Neil Spring Today s Plan Talk about networking in general Layers, Routing Specifically about IP and TCP Service model, what TCP provides Work our
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationIntroduction to RESTful Web Services. Presented by Steve Ives
1 Introduction to RESTful Web Services Presented by Steve Ives Introduction to RESTful Web Services What are web services? How are web services implemented? Why are web services used? Categories of web
More informationIQRF Mature technology and fast growing Alliance for IoT
IQRF Mature technology and fast growing Alliance for IoT Jan Vasta IQRF Alliance, CEO January 23 rd, 2017 IQRF Alliance We are an international community of developers, manufactures, system integrators
More informationNetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led
NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course
More informationMicrosoft Independent Software Microsoft Independent Vendor Royalty License and Software Vendor Royalty
Microsoft Independent Software Microsoft Independent Vendor Royalty License and Software Vendor Royalty Distribution License and Agreement Distribution Program Agreement Guide Microsoft ISV Royalty License
More informationBack-end architecture
Back-end architecture Tiberiu Vilcu Prepared for EECS 411 Sugih Jamin 2 January 2018 https://education.github.com/pack 1 2 Outline HTTP 1. HTTP and useful web tools 2. Designing APIs 3. Back-end services
More informationORACLE ENTERPRISE COMMUNICATIONS BROKER
ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP
More informationCisco I/O Accelerator Deployment Guide
Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER
Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the
More informationNetworking Named Content
Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University
More informationProtocol for Tetherless Computing
Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous
More informationQuestion Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100
NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning
More informationIntroduction to the Internet
Introduction to the Internet CCST9015 8 th Sep, 2010 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering 2 Internet in 2003 3 Internet Basics The Internet is a network that connects
More informationAddressed Issue. P2P What are we looking at? What is Peer-to-Peer? What can databases do for P2P? What can databases do for P2P?
Peer-to-Peer Data Management - Part 1- Alex Coman acoman@cs.ualberta.ca Addressed Issue [1] Placement and retrieval of data [2] Server architectures for hybrid P2P [3] Improve search in pure P2P systems
More informationExam Questions
Exam Questions 642-997 DCUFI Implementing Cisco Data Center Unified Fabric (DCUFI) v5.0 https://www.2passeasy.com/dumps/642-997/ 1.Which SCSI terminology is used to describe source and destination nodes?
More informationCitrix NetScaler Traffic Management
Citrix NetScaler Traffic Management CNS220; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who
More informationMoving Data on the Edge. The fastest & most reliable way to transfer files
Moving Data on the Edge The fastest & most reliable way to transfer files Resilio Connect The Fastest & Most Reliable Way to Move Files Our customers use Resilio Connect for the peace of mind at reliably
More informationIntroducing. Thursday, May 3 14:45-15:20 Colin Sullivan / Waldemar Quevedo /
Introducing Thursday, May 3 14:45-15:20 Colin Sullivan / colin@nats.io Waldemar Quevedo / wally@nats.io What is messaging? Messaging here means Message Oriented Middleware Wikipedia Message-oriented middleware
More informationSTEVE GOODING JUNE 15, 2018
ARMOR: THE STATE OF THE INDUSTRY STEVE GOODING JUNE 15, 2018 Agenda 1. Welcome 2. Introduction to Armor 3. Honeypot Report 4. Black Market Report 2 ARMOR IN THE CYBERSECURITY SPACE 3 About Armor DATA CENTERS:
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationConstrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral
Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Student @dcs.aalto Outline Introduction CoAP at a glance Messages Observe Hardware Demo MAMMOTH Conclusions References 50 billion connected
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationMODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY)
MODEL ANSWER PAPER SUBJECT: COMPUTER ORGANIZATION & OPERATING SYSTEM (THEORY) STD: XII Max Marks: 50 Course: Computer Technique Time: 2 hrs Q1A.) Fill in the blanks by choosing the appropriate words from
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationAV-friendly networking. Cambridge, England
AV-friendly networking Cambridge, England www.ninetiles.com Benefits of networks for AV Live and file transfer on the same infrastructure Few high-capacity links vs many single-signal Easier to reconfigure
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala October 9, 2018 (a) October 18 October 9,
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 9, 2018 (a) October 18 October 9, 2018 1 host Message, Segment, Packet, and Frame host HTTP HTTP message HTTP TCP TCP segment
More informationbitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651
bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651 Bitcoin distributed, reliable ("hard to falsify") time-stamping network each time-stamp record
More informationAzure Cloud Architecture
Azure Cloud Architecture Training Schedule 2015 May 18-20 Belgium (TBD) Overview This course is a deep dive in every architecture aspect of the Azure Platform-as-a-Service components. It delivers the needed
More informationSwitch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp
Switch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp White Paper Parallels Remote Application Server 2017 Table of Contents Executive Summary... 3 Introduction... 4 Who
More informationExam Questions C
Exam Questions C9510-317 IBM WebSphere Application Server Network Deployment V8.0, Core Administration https://www.2passeasy.com/dumps/c9510-317/ 1. A system administrator needs to automate management
More informationPrerequisites CNS-220 Citrix NetScaler Essentials and Traffic Management
CNS-221 Citrix NetScaler Unified Gateway Learn the skills required to configure and manage NetScaler Gateway and Unified Gateway features, including how to implement Gateway components including NetScaler
More informationExpense Management for Microsoft Dynamics NAV
Expense Management for Microsoft Dynamics NAV Tables and Fields Documentation - Version 2.60 Expense Management - Tables and Fields Documentation - Version 2.50 Page 1 / 67 TABLE OF CONTENTS INTRODUCTION...
More informationCISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION
CUSTOMER TESTIMONIAL CISCO IT DEPARTMENT DEPLOYS INNOVATIVE CISCO APPLICATION- ORIENTED NETWORKING SOLUTION EXECUTIVE SUMMARY Visionary Technology Provides New Model for Application Infrastructure Services
More informationKent State University
CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-9, S-2 Internet
More informationRouting on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP
Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol
More informationWhere is Geolocation of an IP Address?
WHAT IS MY IP HIDE IP CHANGE IP VPN PROXY DDOS WEB S KB FORUMS Where is Geolocation of an IP Address? Your public IP Address is 73.245.1.29. Hide IP with VPN IPv4, IPv6 or Domain Name IP Lookup Here are
More informationImportance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks
Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication
More informationHUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date
HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationMobile Banking. Monticello Banking Company. User Guide for Customers. May 24, 2011
Monticello Banking Company Mobile Banking User Guide for Customers May 24, 2011 1 Enrolling in Mobile Banking Login to NetTeller at www.bankatmbc.com Click Options > Mobile Settings Activate mobile banking
More informationFutureNet IV Fourth International Workshop on the Network of the Future, in conjunction with IEEE ICC
Sasu Tarkoma, Dmitriy Kuptsov, and Petri Savolainen Helsinki Institute for Information Technology University of Helsinki and Aalto University Pasi Sarolahti Aalto University FutureNet IV Fourth International
More informationCNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS
CNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS The objective of this course is to provide the foundational concepts and teach the skills necessary to deploy, secure and manage a Citrix NetScaler
More informationIntro. to Computer Network
Intro. to Computer Network n Wed. 2:20pm-5:20pm, in CSIE 101 n Instructor: Cheng-Fu Chou Email:ccf@csie.ntu.edu.tw Office hours: by appointments n TAs: (506) 晧 : nypgand1@gmail.com : victorsun1221@gmail.com
More informationZero to Microservices in 5 minutes using Docker Containers. Mathew Lodge Weaveworks
Zero to Microservices in 5 minutes using Docker Containers Mathew Lodge (@mathewlodge) Weaveworks (@weaveworks) https://www.weave.works/ 2 Going faster with software delivery is now a business issue Software
More informationModernizing Meetings: Delivering Intel Unite App Authentication with RFID
Modernizing Meetings: Delivering Intel Unite App Authentication with RFID INTEL UNITE SOLUTION WHITE PAPER Revision 1.0 Document Number: 599309-1.0 Legal Disclaimers and Copyrights All information provided
More informationDNS Setup Guide. Connection Broker. Advanced Connection Management For Multi-Cloud Environments
DNS Setup Guide Connection Broker Advanced Connection Management For Multi-Cloud Environments Version 9.0 June 2018 Contacting Leostream Leostream Corporation 271 Waverley Oaks Rd Suite 206 Waltham, MA
More information31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers
31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network
More informationIslamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.
Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion Chapter 1 Foundation Eng. Haneen El-Masry February, 2014 A Computer Network A computer
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More information6.033 CHRONICLE. Andres Romero Julián González - Andrew Moran - Instructor: Srini Devadas
6.033 Andres Romero andresr@mit.edu Julián González - jugonz97@mit.edu Andrew Moran - andrewmo@mit.edu Instructor: Srini Devadas Tuesday/Thursday 12PM 05/12/2013 CHRONICLE [ ] An Emergency Ad-Hoc Wireless
More informationService Activation for AT&T NetBond For AT&T Control Center
Service Activation for AT&T NetBond For AT&T Control Center Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo, Mobilizing Your World, DIRECTV and other marks are
More informationHigh Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions
High Volume Messaging with IBM MessageSight for use in Mobile, Web and M2M solutions Dave Locke IBM Software Group Trademark Statement IBM and the IBM logo are trademarks of International Business Machines
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2012 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #1 Assigned today Due in one week Application layer: DNS, HTTP, protocols Recommend you start early
More informationEnterasys K-Series. Benefits. Product Overview. There is nothing more important than our customers. DATASHEET. Operational Efficiency.
DATASHEET Enterasys K-Series Product Overview The Enterasys K-Series is the most cost-effective, flow-based switching solution in the industry. Providing exceptional levels of automation, visibility and
More informationSECC ONLINE PLEDGING: STEP-BY-STEP GUIDE
SECC ONLINE PLEDGING: STEP-BY-STEP GUIDE 1. There are two ways to get started Option 1: Use your SECC campaign area s online pledge link (example on the right). Option 1: Ex: www.secctexasgiving.org/_capitalarea
More informationUnderstanding of basic networking concepts (routing, switching, VLAN, firewall functionality)
Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based
More informationInternet of Things: An Introduction
Internet of Things: An Introduction IoT Overview and Architecture IoT Communication Protocols Acknowledgements 1.1 What is IoT? Internet of Things (IoT) comprises things that have unique identities and
More informationWelcome to Bonzi Registration!
Welcome to Bonzi Registration! This tutorial will show you the family perspective of the registration process and walk you through the steps you need in order to successfully manage registration. It will
More informationVMware vcenter Log Insight Manager. Deployment Guide
VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationDirect Link Communication I: Basic Techniques. Data Transmission. ignore carrier frequency, coding etc.
Direct Link Communication I: Basic Techniques Link speed unit: bps abstraction Data Transmission ignore carrier frequency, coding etc. Point-to-point link: wired or wireless includes broadcast case Interested
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationOutline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationWelcome to Gumnut Cloud
Welcome to Gumnut Cloud How does it work : Benefits Of Gumnut Cloud In our Cloud solution, applications and data are stored, run from, and managed by a central Cloud server. Users do not download and install
More informationIntroduction to WebSphere Platform Messaging (WPM)
Introduction to WebSphere Platform Messaging (WPM) Unit Objectives After completing this unit, you should be able to discuss: Overview of WebSphere Messaging system Service Integration Bus Architecture
More information